Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 14 July 2022

Chunlai Yan, Hongxia Li, Ruihui Pu, Jirawan Deeprasert and Nuttapong Jotikasthira

This study aims to provide a systematic and complete knowledge map for use by researchers working in the field of research data. Additionally, the aim is to help them quickly…

1680

Abstract

Purpose

This study aims to provide a systematic and complete knowledge map for use by researchers working in the field of research data. Additionally, the aim is to help them quickly understand the authors' collaboration characteristics, institutional collaboration characteristics, trending research topics, evolutionary trends and research frontiers of scholars from the perspective of library informatics.

Design/methodology/approach

The authors adopt the bibliometric method, and with the help of bibliometric analysis software CiteSpace and VOSviewer, quantitatively analyze the retrieved literature data. The analysis results are presented in the form of tables and visualization maps in this paper.

Findings

The research results from this study show that collaboration between scholars and institutions is weak. It also identified the current hotspots in the field of research data, these being: data literacy education, research data sharing, data integration management and joint library cataloguing and data research support services, among others. The important dimensions to consider for future research are the library's participation in a trans-organizational and trans-stage integration of research data, functional improvement of a research data sharing platform, practice of data literacy education methods and models, and improvement of research data service quality.

Originality/value

Previous literature reviews on research data are qualitative studies, while few are quantitative studies. Therefore, this paper uses quantitative research methods, such as bibliometrics, data mining and knowledge map, to reveal the research progress and trend systematically and intuitively on the research data topic based on published literature, and to provide a reference for the further study of this topic in the future.

Details

Library Hi Tech, vol. 42 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Open Access
Article
Publication date: 6 May 2014

Rachel Spacey, Louise Cooke, Adrienne Muir and Claire Creaser

The purpose of this paper is to review current knowledge, research and thinking about the difficulties facing public libraries offering internet access to their users in ensuring…

8640

Abstract

Purpose

The purpose of this paper is to review current knowledge, research and thinking about the difficulties facing public libraries offering internet access to their users in ensuring legally compliant and non-offensive use of this facility whilst still adhering to the professional value of freedom of access to information.

Design/methodology/approach

A range of recently published sources (1997-2013) relating to the technical and organisational measures used to manage public internet access primarily in public libraries in the UK with some limited international examples were reviewed and analysed. This work was undertaken as the underpinning research for an AHRC-funded project, MAIPLE (Managing Access to the internet in Public Libraries).

Findings

The provision of public internet access is a well-established component of the role of public libraries, but is seen as a potential problem due to the possibility of misuse, and it appears that simplistic technical solutions have disappointed. Legislation increases the need for more effective solutions that can provide a balance between the need for legal compliance, a welcoming environment for users, and the protection of key freedoms. A range of measures are being adopted worldwide in response to this dilemma.

Originality/value

Research exploring internet access in public libraries and its management in the UK is numerically small and much of it dates back to the start of the twenty-first century. This review presents a comprehensive analysis of the available literature and is of relevance to practitioners and academics in the fields of public librarianship.

Details

Journal of Documentation, vol. 70 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 15 February 2024

Makutla Gibson Mojapelo

The purpose of this study was to investigate a framework for the implementation of freedom of information (FOI) legislation in South Africa, against Article 19’s nine principles…

Abstract

Purpose

The purpose of this study was to investigate a framework for the implementation of freedom of information (FOI) legislation in South Africa, against Article 19’s nine principles of FOI legislation.

Design/methodology/approach

This qualitative study used semi-structured interviews to collect data from six experts selected by means of the snowball sampling technique and content analysis. The study used a modified Delphi design consisting of two rounds of interviews.

Findings

The results showed that little effort is made by government officials to demonstrate commitment to the implementation of FOI legislation.

Practical implications

The passing of FOI is expected to reduce corruption, increase public participation, reduce the level of secrecy and increase transparency and openness. This is not the case as the implementation of this socioeconomic right in South Africa is faced by numerous challenges, such as a lack of political will, secrecy laws providing for the opposite of what the FOI legislation seeks to achieve, poor legislative interpretation and a lack of clear policies. The study proposes a framework aimed at addressing these challenges.

Originality/value

The study provides a framework for the implementation of FOI legislation. The framework was developed under the guidance of Article 19 principles of freedom of information legislation.

Details

Information Discovery and Delivery, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-6247

Keywords

Open Access
Article
Publication date: 20 October 2022

Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…

Abstract

Purpose

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.

Design/methodology/approach

The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.

Findings

This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.

Research limitations/implications

The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.

Practical implications

Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.

Social implications

Shared awareness and protection of ICT resources.

Originality/value

Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 24 May 2023

Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens and Malcolm Ryan

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity…

1529

Abstract

Purpose

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity professionals, the authors conducted a study to uncover profiles of human factors that influence which ethical principles are valued highest following exposure to ethical dilemmas presented in a cybersecurity game.

Design/methodology/approach

The authors’ game first sensitises players (cybersecurity trainees) to five cybersecurity ethical principles (beneficence, non-maleficence, justice, autonomy and explicability) and then allows the player to explore their application in multiple cybersecurity scenarios. After playing the game, players rank the five ethical principles in terms of importance. A total of 250 first-year cybersecurity students played the game. To develop profiles, the authors collected players' demographics, knowledge about ethics, personality, moral stance and values.

Findings

The authors built models to predict the importance of each of the five ethical principles. The analyses show that, generally, the main driver influencing the priority given to specific ethical principles is cultural background, followed by the personality traits of extraversion and conscientiousness. The importance of the ingroup was also a prominent factor.

Originality/value

Cybersecurity professionals need to understand the impact of users' ethical choices. To provide ethics training, the profiles uncovered will be used to build artificially intelligent (AI) non-player characters (NPCs) to expose the player to multiple viewpoints. The NPCs will adapt their training according to the predicted players’ viewpoint.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 23 December 2022

Patrick Ajibade and Ndakasharwa Muchaonyerwa

This study aims to promote the need for advanced skills acquisition within the LIS and academic libraries. This study focuses on the importance of library management systems and

1679

Abstract

Purpose

This study aims to promote the need for advanced skills acquisition within the LIS and academic libraries. This study focuses on the importance of library management systems and the need for the graduates to be equipped with analytics skills. Combined with basic data, text mining and analytics, knowledge classification and information audit skills would benefit libraries and improve resource allocation. Agile institutional libraries in this big data era success hinge on the ability to perform depth analytics of both data and text to generate useful insight for information literacy training and information governance.

Design/methodology/approach

This paper adopted a living-lab methodology to use existing technology to conduct system analysis and LMS audit of an academic library of one of the highly ranked universities in the world. One of the benefits of this approach is the ability to apply technological innovation and tools to carry out research that is relevant to the context of LIS or other research fields such as management, education, humanities and social sciences. The techniques allow us to gain access to publicly available information because of system audits that were performed. The level of responsiveness of the online library was accessed, and basic information audits were conducted.

Findings

This study indicated skill gaps in the LIS training and the academic libraries in response to the fourth industrial technologies. This study argued that the role of skill acquisition and how it can foster data-driven library management operations. Hence, data mining, text mining and analytics are needed to probe into such massive, big data housed in the various libraries’ repositories. This study, however, indicated that without retraining of librarians or including this analytics programming in the LIS curriculum, the libraries would not be able to reap the benefits these techniques provided.

Research limitations/implications

This paper covered research within the general and academic libraries and the broader LIS fields. The same principle and concept is very important for both public and private libraries with substantial usage and patrons.

Practical implications

This paper indicated that librarianship training must fill the gaps within the LIS training. This can be done by including data mining, data analytics, text mining and processing in the curriculum. This skill will enable the news graduates to have skills to assist the library managers in making informed decisions based on user-generated content (UGC), LMS system audits and information audits. Thus, this paper provided practical insights and suggested solutions for academic libraries to improve the agility of information services.

Social implications

The academic librarian can improve institutional and LMS management through insights that are generated from the user. This study indicated that libraries' UGC could serve as robust insights into library management.

Originality/value

This paper argued that the librarian expertise transcends information literacy and knowledge classification and debated the interwoven of LMS and data analytics, text mining and analysis as a solution to improve efficient resources and training.

Details

Library Hi Tech News, vol. 40 no. 4
Type: Research Article
ISSN: 0741-9058

Keywords

Open Access
Article
Publication date: 15 August 2019

Carina Rey Martin, Concepción Rodriguez Parada and Enric Camón Luis

The purpose of this paper is to analyse the level of transparency of the libraries of Catalan universities that are members of the Consortium of University Services of Catalonia…

Abstract

Purpose

The purpose of this paper is to analyse the level of transparency of the libraries of Catalan universities that are members of the Consortium of University Services of Catalonia (CSUC).

Design/methodology/approach

The analysis involved reviewing the information available on the websites of the ten libraries belonging to CSUC. For each library’s website, the presence of 18 indicators was explored. These indicators had been defined by the Commitment and Transparency Foundation (Spain).

Findings

There is a notable difference between the level of transparency of Catalan universities and their libraries. Moreover, the universities’ culture of transparency is not reflected in that of the libraries. Four of the libraries can be considered transparent because they have accomplished from 12 to 18 indicators; three can be considered “translucent”, due to their indicators ranging from 11 to 7 points; and three are considered opaque as a result of obtaining from 1 to 5 indicators.

Practical implications

There is a need to review the volume and quality of information that can be consulted on library websites, considering that all services and entities funded with public money must inform citizens of the principles that govern their management and the results obtained.

Originality/value

The information regarding transparency is incomplete and should be organised with parameters that make it easier to find. Libraries that occupy the lowest positions in the ranking all belong to private universities. Their poor results are due to the lack of information justifying their management or providing information on how the service is organised. Some conclusions of this study are very similar to those of the study on Madrid’s Madroño Consortium (Pacios Lozano, 2016) which has been taken into account in this paper.

Open Access
Article
Publication date: 25 August 2023

Anna Leonard, Josiline Chigwada and Gilbert Mushi

This study aims to examine the state of embedded librarianship in African academic libraries by exploring the extent of librarian embedment in research processes in selected…

Abstract

Purpose

This study aims to examine the state of embedded librarianship in African academic libraries by exploring the extent of librarian embedment in research processes in selected academic libraries in Africa.

Design/methodology/approach

A survey was conducted to collect data using an online questionnaire. The study population was comprised of librarians who directly support researchers throughout the research process in the scholarly communication and information services sections. Purposive sampling was used to select librarians, and 63 responses were received from the target of 100. The collected data were analysed using the statistical package for the social sciences (SPSS) software, and content analysis was used to analyse open-ended questions.

Findings

The study results showed that the extent and nature of librarians' embeddedness in the research process vary across different university contexts in Africa. Challenges and areas of research skill gaps among librarians were identified, and propositions to address the research skill gaps were provided.

Practical implications

The study findings can be used as a framework for libraries to embed librarians in the research process. The study made recommendations with practical implications for library practitioners in academia, and institutions offering library and information science education, and the library management responsible for the research process.

Originality/value

A study brings a novel perspective by examining the state of embedded librarianship in the African context. Its contribution generates knowledge and insights that inform the development of effective embedded librarianship practices in African academic libraries to enhance research support services and advancement of scholarly research in the region.

Open Access
Article
Publication date: 30 June 2020

Asefeh Asemi, Andrea Ko and Mohsen Nowkarizi

This paper reviews literature on the application of intelligent systems in the libraries with a special issue on the ES/AI and Robot. Also, it introduces the potential of libraries

21917

Abstract

Purpose

This paper reviews literature on the application of intelligent systems in the libraries with a special issue on the ES/AI and Robot. Also, it introduces the potential of libraries to use intelligent systems, especially ES/AI and robots.

Design/methodology/approach

Descriptive and content review methods are applied, and the researchers critically reviewed the articles related to library ESs and robots from Web of Science as a general database and Emerald as a specific database in library and information science from 2007–2017. Four scopes considered to classify the articles as technology, service, user and resource. It is found that published researches on the intelligent systems have contributed to many librarian purposes like library technical services like the organization of information resources, storage and retrieval of information resources, library public services as reference services, information desk and other purposes.

Findings

A review of the previous studies shows that ESs are a useable intelligent system in library and information science that mimic librarian expert’s behaviors to support decision making and management. Also, it is shown that the current information systems have a high potential to be improved by integration with AI technologies. In this researches, librarian robots mostly designed for detection and replacing books on the shelf. Improving the technology of gripping, localizing and human-robot interaction are the main concern in recent librarian robot research. Our conclusion is that we need to develop research in the area of smart resources.

Originality/value

This study has a new approach to the literature review in this area. We compared the published papers in the field of ES/AI and robot and library from two databases, general and specific.

Open Access
Article
Publication date: 6 November 2017

Bee Leng Chew, Marnisya Abdul Rahim and Vighnarajah Vighnarajah

Recent advancement in technological development has encouraged distance learning institutions to be more productive and creative in effectively utilizing the Learning Management

3555

Abstract

Purpose

Recent advancement in technological development has encouraged distance learning institutions to be more productive and creative in effectively utilizing the Learning Management System (LMS). Among the many measures employed is the integration of federated search engine into the LMS which allows for a more productive and wider scope of information retrieval through the provisions of library resources and services. The purpose of this paper is to report one such case study in Wawasan Open University exploring the integration of federated search engine (EBSCO Discovery Service (EDS) widget) into the learning spaces of LMS. Widgets resemble apps that enable the integration of EDS functionality in providing access for students to retrieve library learning resources from the convenience of the LMS, excluding the need to log onto the library.

Design/methodology/approach

This paper presents a discussion that highlights the development and conjectural implementation of a framework on the integration of the EDS widget into the University’s LMS. Data collection includes meta-analysis data from the micro- and macro-level infrastructure that make up the framework, namely, end-user layer, system layer and data management layer.

Findings

Findings from this study addressed significant importance to the library in promoting effective search and utilization of information needs. The findings will also make clear recommendations in developing effective collaborations between the library and faculties. Although the implementation of this framework is still in a developmental stage, this study still provides pertinent information in validating the integration of EDS into the University’s LMS.

Research limitations/implications

While serious limitations are not anticipated, possible concerns do exist with programming algorithms in the integration of EDS into the LMS. These challenges will be reported in the paper as reference for future replications of study

Practical implications

One key implication is the increase in the usage of the library resources and the potential to reach a larger audience of remote library users.

Originality/value

The primary advantage is to minimize the need for multiple gateway login while ensuring the library to monitor relevant library databases activities throughout the system check of the LMS.

Details

Asian Association of Open Universities Journal, vol. 12 no. 2
Type: Research Article
ISSN: 2414-6994

Keywords

1 – 10 of over 1000